~e; want DIRT? use HOPE!

From bc <human@electronetwork.org>
Date Sun, 17 Mar 2002 13:15:07 -0600





  [this is out of the 'too hard to believe is true' file, from the
  listmainter's perspective, but i have little if any doubt that
  this is a honeypot device, that- hey- could even be in use by
  infamous net.architects and artists, playing w/ gaming theory.
  some stuff bites back, and it is worth mentioning that this is a
  list that is monitored by internet surveillance companies and
  others, and so things public and private are being kept in check
  by these guardians. but, at the same time, this type of no-good
  stuff is out there, while people play around with scripts as a
  type of collegiate competition in being dimwitted demagogues.
  so, once baited, you infect others, and it is good for all to know
  that by participating in certain activities, well, you get to be a
  part of the story, so to say. and this is why complexity is not
  so simple as some make it out to be. and it is my hope that the
  people who surveil this website, not for the content, but the
  people and their interest in knowing and learning about the new
  EM environment around them, unveiled both in the arts and in
  the sciences- that so too, even if politics and economics and
  social systems come into play in these fundamental systems-
  it is pure terror to assume the worse of genuine inquiry. but
  so too, a word for those who do not believe they are part of
  the same game, who may like the content but may disagree
  with some of the ideas that others have, that co-inhabit our
  complex societies. well, please be aware that if one is going
  to use a technology against another, and knows little about it,
  it may be working for the very thing they stand in opposition
  to,  contradicting their own personal beliefs, as this software
  update on cryptome.org recognizes with supreme eloquence.]

  this message is sent for EDUCATIONAL PURPOSEs only. it is
  not taking issue with anything more than the use of EM tech,
  and also, the people who decide its use, as a form of inquiry.

_________________________________
* notice the accurate acronym:

HOPE: 	Harnessing the
	Omnipotent Power
	of the Electron
_________________________________
from cryptome (run by John Young, NYC architect, the design-list owner)
http://cryptome.org/dirty-hope.htm

nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn

17 March 2002. Thanks to Anonymous.

This is one of about 140 leaked files on Codex Data Systems products
for covert surveillance and spying. A principal Codex product is
DIRT, a covert trojan horse program. For more on DIRT:
http://cryptome.org/dirt-guide.htm

For reader feedback and caution on the DIRT program release:
http://cryptome.org/dirt-feedback.htm

The leaked files did not include the HOPE program described below.

Considering the vile reputation of Codex Data Systems, headed by a
convicted ex-cop, it is worth pondering whether any of the leaked
Codex material contains code which reports back to Codex what is
happening to the material and what machine is being used. Among its
nasty snooping products, Codex markets BAIT and HOPE which plant such
tracking and user-identification code in documents. DIRT, BAIT and
HOPE report to a designated party information on targets gathered by
the programs. As described for HOPE below, Codex proposes that its
programs can be used to set up "dangles," that is, alluring bait to
ensnare targets whose access to and use of the dangles are logged and
reported back to the dangler. These are standard dirty-tricks and
traps in the world of intelligence and covert surveillance.

Cryptome was assured by the dirty-tricks-knowledgeable source of the
Codex material that it had been carefully checked for covert hooks
and code and none was found. However, users should beware that
criminal products by Codex are treacherous and could double-cross.
Development of protection against treachery and double-cross of
seemingly benign and covertly criminal products, not only from Codex,
is the purpose of releasing the Codex material.

------------------------------------------------------------------------

Original file: http://cryptome.org/hope.ppt (560KB)

[12 slides.]

Codex Data Systems
The Computer Surveillance
Experts

H.O.P.E.TM

Harnessing the
Omnipotent Power
of the Electron

------------------------------------------------------------------------

What is H.O.P.E.TM?

H.O.P.E.TM is a system to mass
distribute D.I.R.T.TM technology via the
internet through a variety of
surreptitious means.

H.O.P.E.TM is available to those
agencies with a D.I.R.T.TM software site
license.

------------------------------------------------------------------------

How does
H.O.P.E.TM work?

------------------------------------------------------------------------

When a target PC visits a H.O.P.E.TM Server,
a D.I.R.T.TM "Bug" is automatically generated
and transmitted by stealth to the target PC.



------------------------------------------------------------------------

The "Bug's" unique tracking coded ID allows
target's identity and location to be traced



------------------------------------------------------------------------

Each new "Bug" will have its own unique ID.
As the original file is passed around,
H.O.P.E.TM logs the chain of possession.

------------------------------------------------------------------------

Various applications for H.O.P.E.TM

H.O.PE. Server
Mass distribution of D.I.R.T. "Bug"
Trojan Horse Site

Possible Military Apps
Dangle Operations

Law Enforcement
Intelligence Gathering

Industry
Network Administration

Anti-terrorism
	Target Select Groups
	Employee Monitoring

Intelligence Gathering
	Organized Crime
	Remote Office Monitoring

Counter-Intelligence
	Narcotics
	Counter Espionage

In-House Security
	Money Laundering
	In-House Security

	Pedophile/Child Pornography


	In-House Security


------------------------------------------------------------------------

H.O.P.E.TM Self Propagating Files

Visitor downloads a file from a H.O.P.E.TM server.
One D.I.R.T.TM "Bug" is automatically generated
and hidden into the downloaded file ...

When the file is opened and read the target PC is
infected. That same file will continue to infect
every PC that is used to access the file if/when the
downloaded file is passed around.

Each new "Bug" will have its own unique ID. As
the original file is passed around, the chain of
possession/command will be logged.

------------------------------------------------------------------------

Typical H.O.P.E.TM Intelligence
Gathering "Dangle"

H.O.P.E.TM Server is loaded and identified as
"U.S. Embassy Server" in foreign country.

Word is "leaked" to terrorist org that server
contain sensitive intelligence. Passwords
might be provided.

H.O.P.E.TM Server logs and identifies all visitors
to the server. D.I.R.T.TM "Bug" is generated with
its unique ID to all visitors to certain areas
and/or those who download files.

------------------------------------------------------------------------

Dangles

H.O.P.E. Server
Dangles

Terrorism
	Pedophiles/Child Porn
	Narcotics


------------------------------------------------------------------------

Dangles II

H.O.P.E. Server
Dangles

Weapons/Explosives
	InfoWar
	Anti-Hacking


------------------------------------------------------------------------

Dangles III

H.O.P.E. Server
Dangles

Biological Threats
	Economic Espionage
	Software Piracy


------------------------------------------------------------------------

More "Dangles"

Informant Files
	Test Results

Personnel Files
	Secret Formulas

Weapons Caches
	Marketing Strategies

Case Information
	Troop Positions

Travel Plans
	Military Strengths

Financial Records
	Sales Prospects

Business Plans
	Contract Bids

Design Information
	Commo Codes


------------------------------------------------------------------------

Codex Data Systems, Inc.


143 Main Street

Nanuet, New York 10954 USA

Tel: +1-845-627-0011

Fax: +1-845-627-0211

E-Mail: sales@codexdatasystems.com

Web Site: www.codexdatasystems.com

 1999-2001, Codex Data Systems, Inc., All rights Reserved.

Codex Data Systems
The Computer Surveillance
Experts

------------------------------------------------------------------------



  the electronetwork-list
  electromagnetism / infrastructure / civilization
		http://www.electronetwork.org/